Venn Software Snags $29M to Build MDM for Laptops Technology – SecurityWeek

Place your AD here

Hi, what are you looking for?
New York startup scores early stage financing to build new technology to replace virtual desktop infrastructure.
By
Flipboard
Reddit
Pinterest
Whatsapp
Whatsapp
Email

Venn Software, a New York startup building an MDM-like solution for laptops, has attracted $29 million in early stage funding as investors continue to bet on cybersecurity companies protecting the remote workforce.
Venn said the Series A financing was led by NewSpring and provides capital for the company to make MDM for laptops a reality and provide a less costly new alternative to virtual desktop infrastructure (VDI).
Venn is pitching a Secure Enclave product that is company controlled and installed on remote employee laptops (Windows or macOS) to ensure all data is encrypted and access is managed. “Similar to MDM, but for laptops, work applications run locally within the enclave where business activity is isolated and protected from any personal use on the same computer,” the company explained.
“Company data is protected without having to control the entire device,” Venn added.
Venn and its investors are betting that remote work and a distributed workforce becomes more permanent, requiring new approaches to manage data flowing through unmanaged devices. The company called attention to the “blurring lines of personal and business time” and warned that the rise of contractors, gig and offshore workers, have pushed companies to look for new ways to secure remote work. 
Venn is arguing that traditional solutions like VDI are costly and often frustrate users because of latency and slowness. In place of VDI technology, Venn says it is building the first purpose-built technology for Secure BYO-PC (Bring Your Own Personal Computer).
“Before Venn, companies had to ship laptops or rely on complex and costly VDI  to support remote workers and stay compliant with regulatory requirements,” said David Matalon, co-founder and CEO at Venn. “Instead of having to buy, manage, and lock down every PC, remote work can now be secured on any BYOD or unmanaged computer.”

Advertisement. Scroll to continue reading.

Related: BYOD Trend Exposes Security Policy Gaps
Related: Secure Enterprise Browser Startup Talon Raises $100 Million
Related: Enterprise Browser Startup Island Snags Massive Funding Round

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.
Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.
Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.
Incorporating Red Zone threat intelligence into your security strategy will help you stay on top of the latest threats and better protect your organization.
Security vendor consolidation is picking up steam with good reason. Everyone wants to improve security efficiency and effectiveness while paying for less.
If you want to begin, or improve, sharing customized intelligence with key users, consider these four aspects as you develop your process.
By having a golden image you will put a process in place that allows you to quickly take action when a vulnerability is found within your organization.
Instead of deploying new point products, CISOs should consider sourcing technologies from vendors that develop products designed to work together as part of a platform. 
Flipboard
Reddit
Pinterest
Whatsapp
Whatsapp
Email
Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.
SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.
Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and…
Thirty-five cybersecurity-related M&A deals were announced in February 2023
Forty cybersecurity-related M&A deals were announced in January 2023.
Forty-one cybersecurity-related M&A deals were announced in March 2023.
Seventeen cybersecurity-related M&A deals were announced in the first half of February 2023.
More than 450 cybersecurity-related mergers and acquisitions were announced in 2022, according to an analysis conducted by SecurityWeek
Got a confidential news tip? We want to hear from you.
Reach a large audience of enterprise cybersecurity professionals
Subscribe to the SecurityWeek Daily Briefing and get the latest content delivered to your inbox.
Copyright © 2023 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.


source

Share this article

Facebook
Twitter
LinkedIn
WhatsApp
Email

More from this Author